Project
 

 

Status of Course Projects

  1. Linux Utility Module for Security- Accepted without modification

  2. SecureAMS - Watch List

  3. Security in Red Hat Linux - Rejected

  4. TCP/IP Attacks: SYN Flooding - Accepted with modifications

  5. Network Packet Sniffer - Accepted with modifications

  6. Malicious Mobile Code - Accepted with comments

  7. Securing a web-service - Watch List

  8. Intrusion Detection System - accepted with comments

  9. Implementation of SSL on registration system-Watch List

  10. Document Security System-Watch List

  11. Online Systemís Password Hacking-Accepted with some modifications

  12. Secure Election Software System-Watch List //you should see the instructor

  13. Securing Distributed Application using .NET infrasturcture - Watch List

  14. Software Firewall - Accepted with modifications- Click for comments/modifications

  15. Softech Group I - A Detailed Project Proposal Awaited

  16. Softech Group II - A Detailed Project Proposal Awaited

 

List of Projects

1. Design of Key Distribution Center for Private Key Systems   (By SofTech)

2. Projects by Instec Digital

 

3. CRD Projects   (Network Security policy of LUMS)
 

Suggested Projects:

 

 

 

 

 

Add firewall-style support to an operating system. You could try developing application-level gateways for several of the common protocols. You could also look at building an efficient router. Rather than just hacking away, you might also look at the software engineering aspect and look at some kind of firewall architecture that has inherent strengths against attacks on any of its protocols.

Web privacy

Cookies can be used to track you. URLs with funny extensions can be used to track you. Web pages load images from third parties like DoubleClick. They're not just advertisements, they're tracking you as well. There are many opportunities to build projects here. You could build Web proxies that do anything from ad filtering, like WebWasher to ad jamming (feeding back bogus cookie information). You could also build systems where privacy emerges as a property of a lot of people surfing at the same time, such as Crowds. On the flip side, you could analyze systems like these and try to systematically break them.

E-mail anonymity

Most of the anonymous e-mail systems out there can be described as follows: you send your e-mail into this cloud and later on an e-mail pops out of the cloud at your destination. A sufficiently determined snooper can watch the end-points and figure out who wrote what. Even if encryption is being used, traffic analysis can detect people who are conversing with each other. One possible project is to use Usenet as a transmission media. Post an encrypted message that means nothing to anybody but the intended receiver. Among other things, you'd have to deal with scalability problems. Conversely, you could build some traffic analysis tools and try to break existing anonymity systems.

Spam filtering

 
Write a classification system that can distinguish spam from normal mail. Another related project would be writing a Web proxy server that filters out advertisements.

Chat systems

 
You're talking to somebody on the chat server today. Tomorrow, you get an e-mail from somebody claiming they're the same person. Build a way for people who don't know each other to be able to identify each other later with some kind of cryptographically strong authentication.

 

Back to Home